summaryrefslogtreecommitdiff
path: root/arch/x86/kernel/cpu/bugs.c
AgeCommit message (Expand)AuthorFilesLines
2024-09-05x86/bugs: Fix handling when SRSO mitigation is disabledDavid Kaplan1-9/+5
2024-07-30x86/bugs: Add a separate config for GDSBreno Leitao1-1/+2
2024-07-30x86/bugs: Remove GDS Force Kconfig optionBreno Leitao1-4/+0
2024-07-30x86/bugs: Add a separate config for SSBBreno Leitao1-4/+6
2024-07-30x86/bugs: Add a separate config for Spectre V2Breno Leitao1-4/+5
2024-07-30x86/bugs: Add a separate config for SRBDSBreno Leitao1-1/+2
2024-07-30x86/bugs: Add a separate config for Spectre v1Breno Leitao1-1/+2
2024-07-30x86/bugs: Add a separate config for RETBLEEDBreno Leitao1-1/+1
2024-07-30x86/bugs: Add a separate config for L1TFBreno Leitao1-1/+2
2024-07-30x86/bugs: Add a separate config for MMIO Stable DataBreno Leitao1-1/+2
2024-07-30x86/bugs: Add a separate config for TAABreno Leitao1-1/+2
2024-07-30x86/bugs: Add a separate config for MDSBreno Leitao1-1/+2
2024-06-28x86/bugs: Add 'spectre_bhi=vmexit' cmdline optionJosh Poimboeuf1-5/+11
2024-05-13Merge tag 'x86-cpu-2024-05-13' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds1-15/+15
2024-04-25x86/bugs: Switch to new Intel CPU model definesTony Luck1-15/+15
2024-04-14x86/bugs: Fix BHI retpoline checkJosh Poimboeuf1-4/+7
2024-04-12x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHIJosh Poimboeuf1-1/+1
2024-04-12x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=autoJosh Poimboeuf1-9/+1
2024-04-11x86/bugs: Clarify that syscall hardening isn't a BHI mitigationJosh Poimboeuf1-3/+3
2024-04-11x86/bugs: Fix BHI handling of RRSBAJosh Poimboeuf1-12/+18
2024-04-11x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr'Ingo Molnar1-15/+15
2024-04-11x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIESJosh Poimboeuf1-15/+7
2024-04-10x86/bugs: Fix return type of spectre_bhi_state()Daniel Sneddon1-1/+1
2024-04-08x86/bhi: Mitigate KVM by defaultPawan Gupta1-1/+8
2024-04-08x86/bhi: Add BHI mitigation knobPawan Gupta1-1/+89
2024-04-08x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs fileJosh Poimboeuf1-12/+12
2024-03-12Merge tag 'rfds-for-linus-2024-03-11' of git://git.kernel.org/pub/scm/linux/k...Linus Torvalds1-5/+87
2024-03-11Merge tag 'x86-core-2024-03-11' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds1-21/+27
2024-03-11x86/rfds: Mitigate Register File Data Sampling (RFDS)Pawan Gupta1-3/+75
2024-03-11x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CPU_BUF is setPawan Gupta1-2/+12
2024-03-04x86/cpu: Use EXPORT_PER_CPU_SYMBOL_GPL() for x86_spec_ctrl_currentThomas Gleixner1-1/+1
2024-02-19x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static keyPawan Gupta1-9/+6
2024-02-12x86/retpoline: Ensure default return thunk isn't used at runtimeJosh Poimboeuf1-0/+5
2024-01-10x86/bugs: Rename CONFIG_CPU_SRSO => CONFIG_MITIGATION_SRSOBreno Leitao1-4/+4
2024-01-10x86/bugs: Rename CONFIG_CPU_IBRS_ENTRY => CONFIG_MITIGATION_IBRS_ENTRYBreno Leitao1-2/+2
2024-01-10x86/bugs: Rename CONFIG_CPU_UNRET_ENTRY => CONFIG_MITIGATION_UNRET_ENTRYBreno Leitao1-3/+3
2024-01-10x86/bugs: Rename CONFIG_RETPOLINE => CONFIG_MITIGATION_RETPOLINEBreno Leitao1-3/+3
2024-01-10x86/bugs: Rename CONFIG_CALL_DEPTH_TRACKING => CONFIG_MITIGATION_CALL_DEPTH_...Breno Leitao1-3/+3
2024-01-10x86/bugs: Rename CONFIG_CPU_IBPB_ENTRY => CONFIG_MITIGATION_IBPB_ENTRYBreno Leitao1-5/+6
2024-01-10x86/bugs: Rename CONFIG_GDS_FORCE_MITIGATION => CONFIG_MITIGATION_GDS_FORCEBreno Leitao1-1/+1
2023-10-20x86/srso: Remove unnecessary semicolonYang Li1-1/+1
2023-10-20x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk()Josh Poimboeuf1-1/+2
2023-10-20x86/srso: Disentangle rethunk-dependent optionsJosh Poimboeuf1-3/+2
2023-10-20x86/srso: Move retbleed IBPB check into existing 'has_microcode' code blockJosh Poimboeuf1-3/+1
2023-10-20x86/bugs: Remove default case for fully switched enumsJosh Poimboeuf1-10/+7
2023-10-20x86/srso: Remove 'pred_cmd' labelJosh Poimboeuf1-8/+13
2023-10-20x86/srso: Fix vulnerability reporting for missing microcodeJosh Poimboeuf1-14/+22
2023-10-20x86/srso: Print mitigation for retbleed IBPB caseJosh Poimboeuf1-3/+3
2023-10-20x86/srso: Print actual mitigation if requested mitigation isn't possibleJosh Poimboeuf1-3/+0
2023-10-20x86/srso: Fix SBPB enablement for (possible) future fixed HWJosh Poimboeuf1-1/+1